CVE-2013-3630
Moodle SpellChecker Path Authenticated Remote Command Execution
Title source: metasploitDescription
Moodle through 2.5.2 allows remote authenticated administrators to execute arbitrary programs by configuring the aspell pathname and then triggering a spell-check operation within the TinyMCE editor.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotelinux
https://www.exploit-db.com/exploits/29324
References (3)
Scores
EPSS
0.6452
EPSS Percentile
98.5%
Details
CWE
CWE-94
Status
published
Products (50)
moodle/moodle
1.1.1
moodle/moodle
1.2.0
moodle/moodle
1.2.1
moodle/moodle
1.3.0
moodle/moodle
1.3.1
moodle/moodle
1.3.2
moodle/moodle
1.3.3
moodle/moodle
1.3.4
moodle/moodle
1.4.1
moodle/moodle
1.4.2
... and 40 more
Published
Nov 01, 2013
Tracked Since
Feb 18, 2026